• Nenhum resultado encontrado

Detecting Fraudsters in Online Auction Using Variations of Neighbor Diversity

N/A
N/A
Protected

Academic year: 2017

Share "Detecting Fraudsters in Online Auction Using Variations of Neighbor Diversity"

Copied!
9
0
0

Texto

(1)

International Journal of Engineering and Technology Innovation, vol. 5, no. 3, 2015, pp. 156-164

Detecting Fraudsters in Online Auction Using Variations of Neighbor

Diversity

Laksamee Khomnotai

1,3,*

, Jun-Lin Lin

1,2

1

Department of Information Management, Yuan Ze University, Taoyuan, Taiwan, ROC.

2

Innovation Center for Big Data and Digital Convergence, Yuan Ze University, Taoyuan, Taiwan, ROC.

3

Faculty of Management Science, Nakhon Ratchasima Rajabhat University, Nakhon Ratchasima, Thailand.

Received 13 March 2015; received in revised form 24 June 2015; accepted 01 July 2015

Abstract

Inflated reputation fraud is a serious problem in online auction. Recent work suggested that neighbor diversity

is an effective feature for discerning fraudsters from normal users. However, there exist many different methods to

quantify diversity in the literature. This raises the problem of finding the most suitable method to calculate neighbor

diversity for detecting fraudsters. We collect four different methods to quantify diversity, and apply them to calculate

neighbor diversity. We then use these various neighbor diversities for fraudster detection. Experimental results on a

real-world dataset demonstrate that, although these diversities were calculated differently, their performances on

fraudster detection are similar. This finding reflects the robustness of neighbor diversity, regardless of how the

diversity is calculated.

Keyword: online auction, fraudster detection, neighbor diversity, entropy

1.

Introduction

Online auction websites have gained increasing popularity for the past few years. This lucrative business opportunity has

drawn both the legitimate sellers to conduct their business online and the deceitful users to engage in fraudulent transactions.

Therefore, online auction websites often provide a recommendation system or a reputation system to assist their users to

distinguish legitimate sellers from fraudsters. The reputation system requests the buyer and the seller of a transaction to give

each other a rating after their transaction is committed. Then, the reputation system calculates a reputation score of each user

based on all the ratings the user received in his/her previous transactions. Intuitively, users with higher reputation scores are

more trustworthy, and consequently are more likely to attract sales [1].

Because the reputation score of a user depends on all the ratings the user received in the past, a legitimate user requires

time and efforts to accumulate good ratings from other users. In contrast, a fraudster often commits the so-called “inflated

reputation fraud” [2] to accumulate good ratings quickly, and cheats the reputation system into giving him/her a high reputation score. The inflated reputation fraud is often achieved by a collusive group of users who conduct fake transactions

within the group and provide good ratings to each other. Since online auction users rely on the reputation score to evaluate the

trustworthiness of other users, detecting the inflated reputation fraud has become a key task for online auction websites.

In the literature, many methods have been proposed to detect fraudsters with inflated reputation in online auctions. Some

of them adopted the concept of network graph to detect fraudsters who rely on their collaborators to boost up their reputations

*Corresponding author. E-mail address: k.laksamee@hotmail.com

(2)

[2-6]. With this concept, social network analysis (SNA) has been found as an effective tool to detect fraudsters and their

cohesive groups [2, 5, 6]. In our recent work [7], we proposed the concept of neighbor diversity to detect inflated reputation

fraud. The neighbor diversity of a user quantifies the diversity of all traders that have transactions with the user. We showed

that the neighbor diversity on the number of received ratings outperformed previous works that use k-core and/or center weight [2, 5, 6].

In [7], Shannon entropy [8] was adopted to quantify the neighbor diversity. However, different ways to define and

calculate diversity exist in the literature. This motivates the idea of using various diversity definitions to calculate neighbor

diversity for fraudster detection. Specifically, we adopt the four different definitions of diversity from [9] to calculate the

neighbor diversity. Our experimental results show, although these diversities are calculated differently, their performances on

fraudster detection are similar. This finding reflects the robustness of neighbor diversity, regardless of how the diversity is

calculated.

The remaining of this paper is as follows. Section 2 reviews previous works on fraudster detection. Section 3 applies

various definitions of diversity to calculate neighbor diversity. Section 4 describes the data collection process. Section 5

presents the experimental settings and discusses the results. Finally, Section 6 concludes this paper.

2.

Related Work

Detecting fraudsters with inflated reputation is a critical issue for online auction websites. Many methods have been

presented in the literature. Some earlier approaches used the properties derived directly from the transaction history. For

example, [10] applied the following user-level features to construct a classifier to detect fraudsters: median and standard

deviation of the prices of items bought/sold within different periods of time, and the ratio between the number of items bought

and the number of transactions. Later, this approach was improved in [3] by incorporating network-level features. The resulted

method constructed a Markov Random Field (MRF) model from past transactions among all users, then applied the results of

the user-level features to instantiate the observed values of the nodes in the MRF model, and finally used the brief propagation

algorithm to compute the probability of being a fraudster for each node. This method was simplified in [4] by initializing the

observed values of the nodes in the MRF model to a constant. Later, the belief propagation algorithm in these approaches [3, 4]

were substituted with the loopy belief propagation algorithm [11].

In [12], both the transaction-related features (i.e., frequency, price, comment and connectedness in the transaction

network) and user-level features (i.e., age and reputation) were applied to investigate the inflated reputation fraud, where a

logistic regression model was built to estimate the likelihood of collusion. Instead of limiting to a small set of features, [13]

used a wrapper approach to select a subset of suitable features from a large candidate feature pool to build a classifier for

fraudster detection.

SNA has gained popularity for developing fraudster detection approaches over the past few years [14-17]. Because the

fraudsters rely on their collusive groups to boost up their reputation by committing fake transactions among themselves, the

cohesive relationship among them must appear in their transaction network, where a node and an edge in the transaction

network represent a user and a transaction, respectively. Common notions of cohesiveness in SNA include component, clique,

k-core, etc. Among them, k-core was found to be the most effective for fraudster detection because fraudsters often occur in

k-core subgroups with k ≥ 2 [2, 6]. Let G = (V, E) denote the graph for the social network, where V is the set of nodes and E is the set of edges. A subgraph H = (W, E/W) induced by the set WV is a k-core if the degree of v is no less than k for every v

(3)

The problem of using k-core alone for detecting fraudsters is low precision. Other features such as core/periphery ratio [2], center weight [5, 20], n-clique, k-plex, degree and normalized betweenness [6] were used to resolve this problem. However, they reduce the recall.

The concept of diversity has been widely used in many domains, e.g., ecology [21-24] and portfolio management [9, 25,

26]. Recently, the concept of neighbor diversity was developed to improve both precision and recall for fraudster detection [7].

As previously mentioned, fraudsters mostly do businesses with their collaborators to boost up their reputation. Consequently,

their collaborators may exhibit similar characteristics, and consequently reduce the neighbor diversity of a fraudster’s

neighbors on those characteristics. Experimental results shows that the neighbor diversity on the number of received ratings

and on the number of cancelled transactions are effective on discerning fraudsters from normal users [7].

3.

Variants of Neighbor Diversity

3.1.Original Form

To calculate neighbor diversity, we must first choose an attribute (denoted as attr). In [7], the number of received ratings or the number of cancelled transactions, is suggested to be the selected attribute. Then, the users are divided into multiples

groups based on the selected attribute. Specifically, if the value of the selected attribute of a user is between 0 and 50, then we

place the user in the first group; if the value of the selected attribute of a user is between 5 × �− and 5 × �− , then we

place the user in the i-th group where i >1. Let x denote a user, pi(x) denote the proportion of x’s neighbors in the i-th group, and n denote the total number of classes. Then, the following constraints must hold.

≤ � � ≤ , � � = � (1)

∑ � �

�= = (2)

Finally, the neighbor diversity of a user on the attribute attris calculated as the group distribution of the user’s neighbors

using Shannon entropy [8] as follows:

�� � = − ∑

� � � �

�=

(3)

In the literature, Shannon entropy has been applied to calculate Shannon’s diversity index. Please refer to [27] for how

Shannon’s entropy is used to study diversity theoretically.

3.2.Variants

The notion of diversity is widely used in many different areas. For example, in portfolio management, diversity is used to

avoid overly concentrated portfolios. Various diversity constraints were proposed, such as weight upper/lower bound

constraint [28], Lp-norm constraint [29] and entropy constraint [26]. Lin [9] proposed a canonical form of these diversity constraints such that the value of diversity is restricted to the same range for all these different definitions of diversity. Instead

of using Shannon entropy to quantify diversity as did in Section 3.1, we can also adopt these canonical forms for calculating

neighbor diversity as described next. For problems related to various diversities, please refer to [26, 28-30].

(4)

(i.e., � ) are known. The max weight neighbor diversity on attr of x, denoted as �� � , is the maximum of all � for i=1 to n, as shown below.

��� � =�= �� � � (4)

The min weight neighbor diversity on attr of x, denoted as �� � , is calculated using the minimum of all � for

i=1 to n, as shown below.

��� � = + − �= � � � (5)

The Canonical Lp-norm neighbor diversity on attr of x, denoted as �� � , is similar to the Lp-norm except the outer exponent is

− instead of , as shown below.

�� � = (∑ |

� � |

�= )

(6)

For the value of pow, the cases of pow = 2 and 3 are commonly used [9]. Hence, we consider only �� � and �� in this study.

The canonical Shannon entropy neighbor diversity on attr of x, denoted as �� � , is the reciprocal of the natural exponential function of Shannon entropy, as shown below.

��� � = −������ = ∑��= � � � (7)

Notably, as proved in [9], the ranges of the neighbor diversity defined in equations (4) to (6) are all the same, i.e., [ ,1].

In Eq.(7), we use log2 instead of the natural logarithm such that�� (x) can be easily calculated from�� � . For a

theoretical comparison of these diversity equations, please refer to [9].

4.

Data Collection and Dataset Preparation

In the study, we collected a dataset from Ruten (www.ruten.com.tw), which is one of the largest online auction websites

in Taiwan [31]. Similar to previous works [5-7], the dataset is grown from a list of suspended users, and then conducted a

level-wise expansion to include more users. The main reason of choosing Ruten in this study is that Ruten regularly releases a

list of suspended users and their reasons of suspension. Notably, a suspended user is not necessarily a fraudster. For example,

a user who is suspended by Ruten due to selling cigarettes or alcohol, is not considered as a fraudster in this study. We collected

9,168 suspended users from Ruten during July 2013, manually checked their reasons of suspension to look for fraudsters, and

finally, identified 932 out of the 9,168 users as fraudsters. However, the status of one of the 932 users was changed back to

normal during October 2013. Therefore, these 932 users, denoted as L1 users, consist of 931 fraudsters and 1 non-fraudster.

Then, we extended from the L1 users to find more users by collecting all users who have given a rating to or received a

rating from any L1 user. In this step, 3,475 new users, denoted as L2 users, were collected, and among them, 149 accounts were

classified as fraudsters. Similarly, we further extended from L2 users to find more users by collecting all users who have given

(5)

while collecting the L1, L2 and L3 users, we also stored the number of received ratings and the number of cancelled transactions

for each user.

In order to calculate the SNA-related features (e.g., k-core and center weight) for all users, a social network of all L1 , L2

and L3 users was built, where each node represents a user and each link represents a rating from one user to another user. To

simplify our social network, duplicate links are removed. The resulting social network contains 237,576 (=932 + 3,475 +

233,169) nodes and 348,259 links. Notably, the ratings that occurred after 31 July 2013 were not included in the social

network.

After the social network was constructed, we calculated k-core and center weight for each node in the social network, as presented in Section 2. Finally, the neighbor diversity for each L1 or L2 user is calculated, as described in Section 3. Notably,

the L3 users are only used to provide a complete view of the L2accounts’ neighbors. Thus, the final dataset contains only the L1

and L2 users, where 1,080 (= 931+149) are fraudsters and 3,327 (= 1 + 3,475 - 149) are non-fraudsters.

For each user in the dataset, the following attributes are available: the number of received ratings, the number of

cancelled transactions, k-core, center weight, neighbor diversity (i.e., �� ) and its variants (i.e., �� , �� , �� , �� , and �� ). The same dataset without the variants of neighbor diversity was also used in [7]. For the selected attribute attr in neighbor diversity and its variants, we use the number of received ratings and the number of cancelled transactions because

they achieved the best performance in [7]. The resulting attributes are denoted as � , � , � , � , � and � for various

types of neighbor diversity on the number of received ratings, and as ��, �� , �� , ��, ��, and �� for various types of

neighbor diversity on the number of cancelled transactions.

5.

Experimental Results

Because previous works suggest using k-core and center weight (CW for short) for fraudster detection [5], in the experimental study, we used k-core, CW and one of the various types of neighbor diversity to build a classifier and compared their performance. Three classification algorithms (J48 decision tree, Neural Networks (NN), and Support Vector Machine

(SVM)) from Weka [32] were used to perform 10-fold cross-validation, and the results are shown in Tables 1 to 6.

Tables 1, 2 and 3 show the results of using various types of neighbor diversity on the number of received ratings, where

the best result of each classification algorithm is shown in bold. Notably, we also show the results of using only k-core and CW in these tables to reflect the impact of adding neighbor diversity. With the addition of neighbor diversity, accuracy, recall and

F1-measure are all improved, although the precision is reduced. Overall, the performance of adding any neighbor diversity is

similar, although the performance of adding � or � sometimes achieves a small recall (shown in italic in Tables 1, 2,

and 3) when using different classification algorithms.

Table 1 J48 Performance of using k-core and CW with or without Dr

Input Accuracy (%) Recall Precision F1-measure

k-core & CW 82.9816 0.5000 0.7200 0.5902

k-core & CW & � 85.8180 0.8731 0.6590 0.7511

k-core & CW & � 85.8861 0.8731 0.6604 0.7520

k-core & CW & � 84.1162 0.8278 0.6349 0.7186

k-core & CW & � 86.1130 0.8685 0.6662 0.7540

k-core & CW & � 86.2038 0.8704 0.6676 0.7556

(6)

Table 2 Neural Network performance of using k-core and CW with or without Dr

Input Accuracy (%) Recall Precision F1-measure

k-core & CW 79.6006 0.5167 0.5968 0.5539

k-core & CW & � 83.7758 0.7787 0.6386 0.7017

k-core & CW & � 84.1616 0.8083 0.6400 0.7144

k-core & CW & � 82.3916 0.6620 0.6350 0.6482

k-core & CW & � 83.9120 0.7981 0.6371 0.7086

k-core & CW & � 83.9573 0.8028 0.6370 0.7104

k-core & CW & � 83.8212 0.7843 0.6383 0.7038

Table 3 Support Vector Machine performance of using k-core and CW with or without Dr

Input Accuracy (%) Recall Precision F1-measure

k-core & CW 82.9362 0.4917 0.7234 0.5855

k-core & CW & � 84.4112 0.7685 0.6551 0.7073

k-core & CW & � 83.0043 0.6835 0.6428 0.6625

k-core & CW & � 83.4581 0.7630 0.6353 0.6933

k-core & CW & � 83.2539 0.7370 0.6368 0.6833

k-core & CW & � 83.2993 0.7398 0.6372 0.6847

k-core & CW & � 83.0951 0.7426 0.6320 0.6828

Tables 4, 5 and 6 show the results of using various types of neighbor diversity on the number of cancelled transactions.

All types of neighbor diversity achieved similar results, and the choice of classification algorithms play a crucial role on their

performance. For example, Table 4 shows that the J48 performance is similar in precision with or without using the neighbor

diversity on the number of cancelled transactions, and achieves better recall with any neighbor diversity (i.e., comparing row 1

against rows 2 to 7 in Table 4). SVM also has similar results (see Table 6). With neural network (see Table 5), the addition of

any neighbor diversity greatly improves the recall but only slightly reduces the precision.

Table 4 J48 Performance of using k-core and CW with or without Dc

Input Accuracy (%) Recall Precision F1-measure

k-core & CW 82.9816 0.5000 0.7200 0.5902

k-core & CW & �� 84.0708 0.5870 0.7124 0.6437

k-core & CW & �� 84.0481 0.5861 0.7120 0.6430

k-core & CW & �� 84.0254 0.5907 0.7089 0.6444

k-core & CW & �� 84.0481 0.5861 0.7120 0.6430

k-core & CW & �� 84.0481 0.5861 0.7120 0.6430

k-core & CW & �� 83.9800 0.5861 0.7096 0.6420

Table 5 Neural Network performance of using k-core and CW with or without Dc

Input Accuracy (%) Recall Precision F1-measure

k-core & CW 79.6006 0.5167 0.5968 0.5539

k-core & CW & �� 81.5975 0.8750 0.5830 0.6997

k-core & CW & �� 81.8698 0.8815 0.5866 0.7044

k-core & CW & �� 82.1194 0.9130 0.5869 0.7145

k-core & CW & �� 81.8698 0.8833 0.5864 0.7048

k-core & CW & �� 81.8698 0.8815 0.5866 0.7044

(7)

Table 6 Support Vector Machine performance of using k-core and CW with or without Dc

Input Accuracy (%) Recall Precision F1-measure

k-core & CW 82.9362 0.4917 0.7234 0.5855

k-core & CW & �� 83.1178 0.5389 0.7029 0.6101

k-core & CW & �� 82.6866 0.5333 0.6898 0.6016

k-core & CW & �� 83.2312 0.6241 0.6693 0.6459

k-core & CW & �� 82.7547 0.5352 0.6914 0.6033

k-core & CW & �� 82.7093 0.5333 0.6906 0.6019

k-core & CW & �� 82.8909 0.5343 0.6969 0.6048

6.

Conclusions

Various ways to quantify diversity exist in the literature [9, 22]. In this work, we apply the diversity of the neighbors of

each trader for detecting fraudsters in online auction. Specifically, we use various methods to calculate diversity, and study

whether these methods cause significant difference on the classification performance of fraudster detection. Our experimental

results show that, using the same classification algorithm, the addition of a neighbor diversity attribute always improves the

recall and F1-measure. The accuracy is almost always improved, except in the case of adding �� to k-core & CW in Table 6.

Among the various ways to calculate neighbor diversity, they all achieve similar performance, and no one is consistently better

than the others.

The performance results also depend on the classification algorithm used. With J48 and SVM, the recall is better with the

addition of Dr than with the addition of Dc. With neural network, the precision is better with the addition of Dr than with the addition of Dc. However, with each of the three classification algorithms, the accuracy is better with the addition of Dr than with the addition of Dc. Overall, any form of neighbor diversity on the number of received ratings (see Tables 1, 2 and 3) achieves better accuracy than its corresponding neighbor diversity on the number of cancelled transactions (see Tables 4, 5 and

6).

The original definition of neighbor diversity only considers the direct neighbors, but the relationship among a collusive

group may go beyond the direct neighbors. Thus, extending the idea of neighbor diversity to indirect neighbors could be

helpful to spot the intrinsic structure of a collusive group. This is left as a possible direction for future work.

Acknowledgments

This research is supported by the Ministry of Science and Technology, Taiwan, R.O.C. under Grant

102-2221-E-155-034-MY3.

References

[1]D. Houser and J. Wooders, "Reputation in Auctions: Theory, and Evidence from eBay," Journal of Economics & Management Strategy, vol. 15, pp. 353-369, 2006.

[2] J. C. Wang and C. Q. Chiu, "Detecting online auction inflated-reputation behaviors using social network analysis," Proc. North American Association for Computational Social and Organizational Science (NAACSOS 05), June 2005, pp. 26-28

[3]D. Chau, S. Pandit, and C. Faloutsos, Detecting Fraudulent Personalities in Networks of Online Auctioneers, Knowledge Discovery in Databases: PKDD 2006, LNAI 4213, pp. 103-114, 2006.

(8)

[5]J. C. Wang and C. C. Chiu, "Recommending trusted online auction sellers using social network analysis," Expert Systems with Applications, vol. 34, pp. 1666-1679, April 2008.

[6]C. C. Chiu, Y. C. Ku, T. Lie, and Y. C. Chen, "Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree Approaches," International Journal of Electronic Commerce, vol. 15, pp. 123-147, Spr. 2011. [7]J. L. Lin and L. Khomnotai, "Using Neighbor Diversity to Detect Fraudsters in Online Auctions," Entropy, vol. 16, pp.

2629-2641, May 2014.

[8]C. E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical Journal, vol. 27, pp. 379-423, 1948.

[9]J. L. Lin, "On the Diversity Constraints for Portfolio Optimization," Entropy, vol. 15, pp. 4607-4621, October 2013. [10] D. H. Chau and C. Faloutsos, "Fraud detection in electronic auction," European Web Mining Forum at ECML/PKDD, pp.

87-97, October 2005.

[11] Z. Bin, Z. Yi, and C. Faloutsos, "Toward a Comprehensive Model in Internet Auction Fraud Detection," Proceedings of the 41st Annual Hawaii International Conference on System Sciences, IEEE Press, Jan. 2008, p. 79.

[12] W. You, L. Liu, M. Xia, and C.Lv, "Reputation Inflation Detection in a Chinese C2C Market," Electronic Commerce Research and Applications, vol. 10, pp. 510-519, September-October 2011.

[13] W. H. Chang and J. S. Chang, "An Effective Early Fraud Detection Method for Online auctions," Electronic Commerce Research and Applications, vol. 11, pp. 346-360, July-August 2012.

[14] M. Morzy, "New Algorithms for Mining the Reputation of Participants of Online Auctions," Algorithmica, vol. 52, pp. 95-112, 2005.

[15] M. Morzy, "Cluster-Based Analysis and Recommendation of Sellers in Online Auction," Computer Systems Science and Engineering, vol. 22, pp. 279-287, 2007.

[16] S. J. Lin, Y. Y. Jheng, and C. H. Yu, "Combining Ranking Concept and Social Network Analysis to Detect Collusive Groups in Online Auctions," Expert Systems with Applications, vol. 39, pp. 9079-9086, 2012.

[17] C. H. Yu and S. J. Lin, "Web Crawling and Filtering for On-line Auctions from a Social Network Perspective," Information Systems and e-Business Management, vol. 10, pp. 201-218, 2012.

[18] V. Batagelj and M. Zaveršnik, "Fast Algorithms for Determining (Generalized) Core Groups in Social Networks," Advances in Data Analysis and Classification, vol. 5, pp. 129-145, July 2011.

[19] V. Batagelj and M. Zaveršnik, "An O(m) Algorithm for Cores Decomposition of Networks," arXiv preprint cs/0310049, pp. 1-10, October 2003.

[20] V. Batagelj and A. Mrvar, "Pajek— Analysis and Visualization of Large Networks," Graph Drawing. vol. 2265, pp. 477-478, 2002.

[21] M. O. Hill, "Diversity and Evenness: A Unifying Notation and Its Consequences," Ecology, vol. 54, pp. 427-432, 1973. [22] H. Tuomisto, "A Consistent Terminology for Quantifying Species Diversity? Yes, It Does Exist," Oecologia, vol. 164, pp.

853-860, December 2010.

[23] L. Jost, "Entropy and Diversity," Oikos, vol. 113, pp. 363-375, 2006.

[24] H. Tuomisto, "A Diversity of Beta Diversities: Straightening Up a Concept Gone Awry. Part 1. Defining Beta Diversity as a Function of Alpha and Gamma Diversity," Ecography, vol. 33, pp. 2-22, 2010.

[25] I. Usta and Y. M. Kantar, "Mean-Variance-Skewness-Entropy Measures: A Multi-Objective Approach for Portfolio Selection," Entropy, vol. 13, pp. 117-133, 2011.

[26] X. X. Huang, "An entropy method for diversified fuzzy portfolio selection," International Journal of Fuzzy Systems, vol. 14, pp. 160-165, March 2012.

[27] A. E. Magurran, Ecological diversity and its measurement, United Kingdom: Croom Helm Ltd, 1988. [28] P. A. Frost and J. E. Savarino, "For better performance: constrain portfolio weights," The Journal of Portfolio

Management, vol. 15, pp. 29-34, 1988.

[29] V. DeMiguel, L. Garlappi, F. J. Nogales, and R. Uppal, "A generalized approach to portfolio optimization: Improving performance by constraining portfolio norms," Management Science, vol. 55, pp. 798-812, May 2009.

[30] R. Jagannathan and T. Ma, "Risk Reduction in Large Portfolios: Why Imposing the Wrong Constraints Helps," The Journal of Finance, vol. 58, pp. 1651-1684, 2003.

[31] C. H. Yu and S. J. Lin, "Fuzzy rule optimization for online auction frauds detection based on genetic algorithm," Electronic Commerce Research, vol. 13, pp. 169-182, May 2013.

(9)

List of Symbols and Nomenclature

SNA Social network analysis

J48 Classification tree J48 algorithm

NN Neural network algorithm

SVM Support vector machine

CW Center weight

� The neighbor diversity on the number of received ratings based on Shannon entropy � � The neighbor diversity on the number of received ratings based on max weight diversity

� � The neighbor diversity on the number of received ratings based on min weight diversity

� The neighbor diversity on the number of received ratings based on canonical Lp-norm diversity with the value of

pow=2

� The neighbor diversity on the number of received ratings based on canonical Lp-norm diversity with the value of

pow=3

�� The neighbor diversity on the number of received ratings based on canonical Shannon entropy

�� The neighbor diversity on the number of cancelled transactions based on Shannon entropy

��� The neighbor diversity on the number of cancelled transactions based on max weight diversity

��� The neighbor diversity on the number of cancelled transactions based on min weight diversity

�� The neighbor diversity on the number of cancelled transactions based on canonical Lp

-norm diversity with the value of pow=2

�� The neighbor diversity on the number of cancelled transactions based on canonical Lp

-norm diversity with the value of pow=3

Imagem

Table 1 J48 Performance of using k-core and CW with or without D r
Table 2 Neural Network performance of using k-core and CW with or without D r Input  Accuracy (%)  Recall  Precision  F1-measure
Table 6 Support Vector Machine performance of using k-core and CW with or without D c    Input  Accuracy (%)  Recall  Precision  F 1 -measure

Referências

Documentos relacionados

vai precisa faze fisio por causa da mielo dele eles não falaram isso na UTI” F8 Estudos sobre recém-nascidos que estiveram internados em UTI Neonatal demonstram que o preparo para

The lyophilized hydroethanolic and infusion extracts were dissolved in ethanol/water (80 : 20, v/v) and water, respectively, to obtain a stock solution of 10 mg mL −1 for

A recuperar da pior crise financeira e económica alguma vez vivida, Portugal é actualmente um dos países mais bem vistos, a nível internacional, no que toca ao turismo e

Minamoto and his colleagues found that in vitreous samples most of the identified proteins were correspondent to serum proteins but the proteins related to the disease state

We characterised further the formation of NMHCIIA bundles during PFT intoxication and found that host cells utilise similar mechanisms to regulate cytoskeletal dynamics

O estudo de caso foi desenvolvido com usuários que trabalham em sistemas integrados, através de metodologia desenvolvida, para descrever os resultados obtidos na

Com o intuito de criar dentro da Operação CMIP um processo piloto para a implementação de um BPMS de forma a demonstrar as mais valias da extensão do projeto, para as mais diversas